Hacking Tools

Check-If-Email-Exists : A Tool To Verify Email Addresses Without Sending Emails

This is open-source, but I also offer a SaaS solution that has check-if-email-exists packaged in a nice friendly web interface.

If you are interested, find out more at Reacher. If you have any questions, you can contact me at amaury@reacher.email.

Get Started

3 non-SaaS ways to get started with check-if-email-exists.

1. HTTP Backend Using Docker (Popular Method ) [Full docs]

This option allows you to run a HTTP backend using Docker, on a cloud instance or your own server. Please note that outbound port 25 must be open.

docker run -p 8080:8080 reacherhq/backend:latest

Then send a POST http://localhost:8080/v0/check_email request with the following body:

{
    "to_email": "someone@gmail.com",
    "from_email": "my@my-server.com", // (optional) email to use in the `FROM` SMTP command, defaults to "user@example.org"
    "hello_name": "my-server.com",    // (optional) name to use in the `EHLO` SMTP command, defaults to "localhost"
    "proxy": {                        // (optional) SOCK5 proxy to run the verification through, default is empty
        "host": "my-proxy.io",
        "port": 1080,
        "username": "me",             // (optional) Proxy username
        "password": "pass"            // (optional) Proxy password
    },
    "smtp_port": 587                  // (optional) SMTP port to do the email verification, defaults to 25
}

2. Download The CLI [Full docs]

Note: The CLI binary doesn’t connect to any backend, it checks the email directly from your computer.

Head to the releases page and download the binary for your platform.

> $ check_if_email_exists --help
check_if_email_exists 0.9.1
Check if an email address exists without sending an email.

USAGE:
    check_if_email_exists [FLAGS] [OPTIONS] [TO_EMAIL]

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

SharpIncrease – Mastering Malware Obfuscation To Bypass Security Detection

Adversaries may use binary padding to add junk data and change the on-disk representation of…

9 hours ago

Deployment Instructions – Setting Up The PinguCrew Project With Docker, Python, And Node.js

At the moment the default configuration when the run_server butler command uses docker containers to run the…

9 hours ago

ROP ROCKET – The Next Evolution Of ROP Chain Generation

This new, advanced ROP framework made it debute at at DEF CON 31 with some…

10 hours ago

ANDROPHSY – Comprehensive Forensic Tool For Android Smartphones

ANDROPHSY is an opensource forensic tool for Android smartphones that helps digital forensic investigator throughout…

11 hours ago

App Metadata – A Comprehensive Guide To iOS, Android, And UWP Application Metadata Extraction

This package has been deprecated, and is not being maintained by MSFT anymore. This library…

11 hours ago

IPGeolocation – A Comprehensive Guide To The IPGeoLocation Tool

IPGeoLocation is a powerful tool designed to fetch detailed geolocation information for any given IP…

1 day ago